期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
试论电视包装的工作流程 被引量:2
1
作者 许云鹏 《记者摇篮》 2015年第2期32-32,共1页
电视包装是一个新兴的行业,它的出现让电视荧屏异彩纷呈。而随着电视制作水平的不断发展,对电视包装的技术要求越来越高,对从业者的素质要求也提出了更高的要求,不仅要具备一定的美术功底,同时也要熟悉相当多软件的操作使用,并且要具有... 电视包装是一个新兴的行业,它的出现让电视荧屏异彩纷呈。而随着电视制作水平的不断发展,对电视包装的技术要求越来越高,对从业者的素质要求也提出了更高的要求,不仅要具备一定的美术功底,同时也要熟悉相当多软件的操作使用,并且要具有一定的收集资料、检索总结能力。电视包装人员不仅仅是一个制作人员,还应是集导演、摄像、舞美、道具、灯光才能于一身的"电视全才"。下面仅就电视包装工作中总结出的工作流程进行梳理说明。1.确定风格样式。在接到电视包装的创作任务后, 展开更多
关键词 电视包装 电视荧屏 风格样式 总结能力 电视制作 制作人员 安全框 技术要求 交片 后期合成
下载PDF
解析数字视频编辑的4个误区 被引量:1
2
作者 吴迪 王秀英 《中国有线电视》 2009年第3期281-283,共3页
在进行数字视频编辑时,经常会遇到画面闪烁、抖动、变形、显示不全等,究其原因可归纳为4个问题,即像素宽高比的概念、隔行扫描视频的处理、安全框的概念和电视节目信号标准问题。这些问题属于数字视频编辑的基本概念,但是由于种种原因,... 在进行数字视频编辑时,经常会遇到画面闪烁、抖动、变形、显示不全等,究其原因可归纳为4个问题,即像素宽高比的概念、隔行扫描视频的处理、安全框的概念和电视节目信号标准问题。这些问题属于数字视频编辑的基本概念,但是由于种种原因,使得部分从业者对这些问题仍是一知半解,严重影响工作质量及效率,为此对这4个问题的起因及原理进行深入的阐述,并提出具体解决方法。 展开更多
关键词 非线性编辑 隔行扫描 像素宽高比 安全框 信号标准
下载PDF
Design and Implementation of Traceability Management System of Agricultural Products Quality and Safety Based on Domestic Basic Software of China 被引量:1
3
作者 徐杰 张俊 +2 位作者 王秀徽 周正 杨宝祝 《Agricultural Science & Technology》 CAS 2012年第8期1811-1816,共6页
[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method]... [Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved. 展开更多
关键词 Domestic based software Quality and safety of agricultural products Traceability management SOA framework Component library
下载PDF
Security integrated framework for semantic web based on social intelligence
4
作者 孟庆华 丁永生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期409-412,共4页
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod... An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies. 展开更多
关键词 integrated security framework social intelligence closed-security-ring security-channel semantic web
下载PDF
非线性编辑的常见问题及解决方法
5
作者 王雪飞 《中国有线电视》 2005年第19期1990-1993,共4页
数字技术的发展使非线性编辑正广泛应用在电视节目制作领域中,用户面临的问题也层出不穷,作者针对安全框、轨道蒙板、场序等具有代表性的问题进行了解释,结合非线性编辑的教学过程指出,教师应尽可能以学生为中心,采用多种教学模式,在真... 数字技术的发展使非线性编辑正广泛应用在电视节目制作领域中,用户面临的问题也层出不穷,作者针对安全框、轨道蒙板、场序等具有代表性的问题进行了解释,结合非线性编辑的教学过程指出,教师应尽可能以学生为中心,采用多种教学模式,在真实的情境中提高学生的应用水平。 展开更多
关键词 字幕 安全框 轨道蒙板 场优先顺序 非线性编辑教学
下载PDF
卡拉罗公司 MACH2型半履带新型拖拉机
6
作者 吴清分 《当代农机》 2015年第6期49-50,共2页
2014年,意大利卡拉罗(Carraro)拖拉机公司面向市场推出了MACH2型半履带新型拖拉机,该机型有2种外型结构,一种装用驾驶室,另一种装用安全框,安全框为系列化装备,而驾驶室为用户选装设备。该拖拉机可以反向驾驶操纵,采用了前装驱动轮胎和... 2014年,意大利卡拉罗(Carraro)拖拉机公司面向市场推出了MACH2型半履带新型拖拉机,该机型有2种外型结构,一种装用驾驶室,另一种装用安全框,安全框为系列化装备,而驾驶室为用户选装设备。该拖拉机可以反向驾驶操纵,采用了前装驱动轮胎和后装橡胶履带的半履带新型结构型式,主要是为一些坡地作物种植农场用户所设计的,在斜坡地上作业时,具有极大的地面附着效率。 展开更多
关键词 MACH2 安全框 拉罗 斜坡地 结构型式 动力输出轴 整体式结构 提升器 操纵系统 转速表
下载PDF
小型化高清转播车实例——助力四平广播电视台制作系统全面高清化
7
作者 王晓峰 《广播与电视技术》 2015年第5期145-146,共2页
1四平广播电视台概况四平广播电视台始建于1986年1月1日,包含综合及公共两个频道,FM93.9人民广播电台、FM99.5交通文艺两个电台。节目覆盖四平市所辖铁西区、铁东区、公主岭市、双辽市、梨树县、伊通满族自治县、辽河农垦管理区7个县(市... 1四平广播电视台概况四平广播电视台始建于1986年1月1日,包含综合及公共两个频道,FM93.9人民广播电台、FM99.5交通文艺两个电台。节目覆盖四平市所辖铁西区、铁东区、公主岭市、双辽市、梨树县、伊通满族自治县、辽河农垦管理区7个县(市)区,73个乡镇,1154个村,以及比邻的辽宁昌图县部分地区。覆盖面积1500平方公里,人口400多万。建台以来。 展开更多
关键词 高清转播车 伊通满族自治县 高清化 切换台 高清演播室 外来信号 液晶监视器 安全框 周边设备 设备
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
8
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
9
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
下载PDF
Safety and Efficacy of Frameless Stereotactic Brain Biopsy Techniques 被引量:3
10
作者 Qiu-jian Zhang Wen-hao Wang +1 位作者 Xiang-pin Wei Yi-gang Yu 《Chinese Medical Sciences Journal》 CAS CSCD 2013年第2期113-116,共4页
Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frame... Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frameless stereotactic brain biopsy between January 2008 and December 2010 in Xiamen University Southeast Hospital.Preoperative characteristics and histological diagnosis were reviewed and then information was analysed to identify factors associated with the biopsy not yielding a diagnosis and complications.Results Diagnostic yield was 93.5%.No differences were found between pathological diagnosis and frozen pathological diagnosis.The most common lesions were astrocytic lesions,included 16 cases of low-grade glioma and 12 cases of malignant glioma.Remote hemorrhage,metastasis,and lymphoma were following in incidence.Multiple brain lesions were found in 17 cases (27.4%).Eleven cases were frontal lesions (17.7%),8 were frontotemporal (12.9%),6 were frontoparietal (9.7%),and 5 each were temporal,parietal,and parietotemporal lesions (8.1%).Postoperative complications occurred in 21.0% of the patients after biopsies,including 10 haemorrhages (16.1%) and 3 temporary neurological deficits (1 epilepsy,1 headache,and 1 partial hemiparesis).No patient required operation for hematoma evacuation.Conclusion Frameless stereotactic biopsy is an effective and safe technique for histologic diagnosis of brain lesions,particularly for multifocal and frontal lesions. 展开更多
关键词 STEREOTAXIS FRAMELESS BIOPSY HISTOLOGY
下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
11
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves... We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers. 展开更多
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack.
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
12
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
Digital Signatures for e-Government - a Long-Term Security Architecture 被引量:1
13
作者 Przemyslaw Blaskiewicz Przemyslaw Kubiak Miroslaw Kutylowski 《China Communications》 SCIE CSCD 2010年第6期64-70,共7页
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante... The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side. 展开更多
关键词 MRSA PSS padding hash based signatures kleptography deterministic signatures
下载PDF
The 2030 Agenda for Sustainable Development and China's implementation 被引量:1
14
作者 Jing Zhu 《Chinese Journal of Population,Resources and Environment》 2017年第2期142-146,共5页
The concept of sustainable development has experienced great development and change at different levels of theoretical connotation and practical implementation since 1960 s and 1970 s when it was first proposed. Peopl... The concept of sustainable development has experienced great development and change at different levels of theoretical connotation and practical implementation since 1960 s and 1970 s when it was first proposed. People's understanding of the relationship between economy,society, and environment has been continuously deepened over the years. When it came to the end of 2015, it is necessary to examine the results of the United Nations Millennium Development Goals on sustainable development, and at the same time, the post-2015 framework and guidance on sustainable development at the global level were to be made, including the ideas, action plans, key areas that would guide the global sustainable development. The 2030 Agenda for Sustainable Development has developed a 5P theoretical framework of being peoplecentered, global environmental security, sustained economic prosperity, social justice and harmony and partnership promotion, including a political declaration, 17 overarching goals and 169 specific targets, specific ways of implementation, as well as the follow-up. It is the road map to achieve global sustainable development and meet the requirements of the millennium development goals. This paper summarizes the understanding of the concept of sustainable development from its origin, its significant development, to the proposition and development of the 2030 Agenda for Sustainable Development, and its strategic impact on China. 展开更多
关键词 Sustainable development the 2030 Agenda for Sustainable Development strategic impact
下载PDF
Impact of International Networks on Standardization Process in Banking Industry: Example of Secure Electronic Transaction (SET) Initiative
15
作者 Paul Marc Collin Hana Machkova 《Journal of Modern Accounting and Auditing》 2013年第11期1469-1482,共14页
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol... The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers. 展开更多
关键词 cyber payments bank cards deterritorialization financial markets secure electronic transaction (SET)specification
下载PDF
A Knowledge Management Framework of the Information Technology-Based Approach for Improving Occupational Safety Training of Young Workers
16
作者 Irena Hejduk Waldemar Karwowski 《Chinese Business Review》 2016年第1期42-47,共6页
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ... This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland. 展开更多
关键词 knowledge management occupational safety education and training young workers
下载PDF
Concept of Integrated Waste Management as Recoverable Resources in Product Cycle
17
作者 Aleksandr Telizhenko Vadym Lukianykhin +4 位作者 Sergey Kuzmenko Elena Lukianykhina Elena Vishnitskaya Min Li Tatyana Shevchenko 《Journal of Environmental Science and Engineering(B)》 2012年第3期312-323,共12页
This paper presents a conceptual framework of integrated waste management which focuses on all stages of product life cycle. A mechanism of resource recovery motivating from waste in economic system (designers, produ... This paper presents a conceptual framework of integrated waste management which focuses on all stages of product life cycle. A mechanism of resource recovery motivating from waste in economic system (designers, producers, consumers, stakeholders in the field of disposal of the product) is suggested. The classification of institutional and economic instruments in the field of waste management as recoverable resources is developed. The author has proposed a scientific and methodical approach to the formation of an integrated waste management as recoverable resources, which is based on a set of methods of economic incentives at all stages of product life cycle and ensures the maximum possible and the environmentally safe management of wastes containing valuable resource components. 展开更多
关键词 WASTE recoverable resources integrated waste management product life cycle organizational-economic mechanism.
下载PDF
灯光摄像机及渲染在布置场景中的运用
18
作者 石渊 《现代装饰(理论)》 2014年第10期164-164,共1页
制作三维动画需要很多步骤,粗略说一下,先是设计剧本,场景人物的设计,设计完后在进行模型的制作,制作完模型后还要进行贴图的制作,之后进行某些模型的骨骼蒙皮,然后进行分镜头的绘画,做完模型动作后开始布置灯光摄像机,完成这些后就可... 制作三维动画需要很多步骤,粗略说一下,先是设计剧本,场景人物的设计,设计完后在进行模型的制作,制作完模型后还要进行贴图的制作,之后进行某些模型的骨骼蒙皮,然后进行分镜头的绘画,做完模型动作后开始布置灯光摄像机,完成这些后就可以开始渲染基本的三维动画了,之后还有配音,剪辑特效之类的。制作所使用的软件:在制作这个三维动画中我们主要使用了3DMAX、PS、PR、AE,3DMAX进行建模渲染制作,PS进行设计稿、模型贴图的制作。 展开更多
关键词 贴图 设计稿 渲染器 渲染速度 动画制作 光度学 关键帧 目标点 安全框 泛光灯
原文传递
The Evaluation of Food and Livelihood Security in a Globally Important Agricultural Heritage Systems(GIAHS)Site 被引量:3
19
作者 YANG Lun YANG Jianhui +2 位作者 JIAO Wenjun LIU Moucheng LI Wenhua 《Journal of Resources and Ecology》 CSCD 2021年第4期480-488,共9页
Based on the basic selection criteria of Globally Important Agricultural Heritage Systems(GIAHS)and food and livelihood security research trends,this paper established an evaluation framework and indicator system for ... Based on the basic selection criteria of Globally Important Agricultural Heritage Systems(GIAHS)and food and livelihood security research trends,this paper established an evaluation framework and indicator system for food and livelihood security in GIAHS and selected the first GIAHS site in the Qinghai-Tibet Plateau as a case for empirical evaluation.The results demonstrate that the food and livelihood security of farmers at this site was at a medium level,with an average evaluation value of 2.91,which still lagged behind the level of better food and livelihood security.Specifically,the average values of farmers’evaluation of food security and livelihood security were 1.43 and 1.48,respectively,which show that farmers’food security in the study area was at a medium level and that of livelihood security was relatively good.Simultaneously,the more simple a farmers’economic activities(i.e.,agriculture-oriented economic activities or non-agriculture-oriented economic activities),the worse their food and livelihood security;while the more diversified the economic activities(i.e.,engaged in part-time economic activities),the better the food and livelihood security. 展开更多
关键词 Globally Important Agricultural Heritage Systems(GIAHS) food security livelihood security concept framework evaluation indicator Biebu Zhagana Agriculture-Forestry-Animal Husbandry Composite System
原文传递
On modeling of electrical cyber-physical systems considering cyber security 被引量:9
20
作者 Yi-nan WANG Zhi-yun LIN +3 位作者 Xiao LIANG Wen-yuan XU Qiang YANG Gang-feng YAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第5期465-478,共14页
This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmis... This paper establishes a new framework for modeling electrical cyber-physical systems(ECPSs),integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model,the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service(Do S) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks. 展开更多
关键词 Cyber-physical systems Cyber attacks Cascading failure analysis Smart grid
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部